The Python Password-Protected Obfuscator
☆33Jul 7, 2019Updated 6 years ago
Alternatives and similar repositories for Ghostfuscator
Users that are interested in Ghostfuscator are comparing it to the libraries listed below
Sorting:
- ☆14Aug 27, 2025Updated 6 months ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- ☆25May 9, 2021Updated 4 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- Arduino Leonardo compatible PHUKD library☆12May 23, 2018Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Feb 17, 2026Updated last week
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- dns rebind tool with custom scripts☆84Apr 5, 2023Updated 2 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆119Mar 18, 2019Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Facebook Mass Account Checker☆59Feb 21, 2021Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago